26,626 research outputs found

    21st Century Simulation: Exploiting High Performance Computing and Data Analysis

    Get PDF
    This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded paradigms in computer utilization and data analysis. The authors then discuss two emerging capabilities to overcome these limitations: High Performance Parallel Computing and Advanced Data Analysis. First, parallel computing, in supercomputers and Linux clusters, has proven effective by providing users an advantage in computing power. This has been characterized as a ten-year lead over the use of single-processor computers. Second, advanced data analysis techniques are both necessitated and enabled by this leap in computing power. JFCOM's JESPP project is one of the few simulation initiatives to effectively embrace these concepts. The challenges facing the defense analyst today have grown to include the need to consider operations among non-combatant populations, to focus on impacts to civilian infrastructure, to differentiate combatants from non-combatants, and to understand non-linear, asymmetric warfare. These requirements stretch both current computational techniques and data analysis methodologies. In this paper, documented examples and potential solutions will be advanced. The authors discuss the paths to successful implementation based on their experience. Reviewed technologies include parallel computing, cluster computing, grid computing, data logging, OpsResearch, database advances, data mining, evolutionary computing, genetic algorithms, and Monte Carlo sensitivity analyses. The modeling and simulation community has significant potential to provide more opportunities for training and analysis. Simulations must include increasingly sophisticated environments, better emulations of foes, and more realistic civilian populations. Overcoming the implementation challenges will produce dramatically better insights, for trainees and analysts. High Performance Parallel Computing and Advanced Data Analysis promise increased understanding of future vulnerabilities to help avoid unneeded mission failures and unacceptable personnel losses. The authors set forth road maps for rapid prototyping and adoption of advanced capabilities. They discuss the beneficial impact of embracing these technologies, as well as risk mitigation required to ensure success

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Evolution or revolution? : the impact of the 1991 Gulf War on United States Air Force doctrine : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in History at Massey University

    Get PDF
    One of mankind's greatest accomplishments this century has been the realisation of powered flight. Aviation has significantly changed the way that humans think, live and, for better or worse, wage war. The advent of airpower has revolutionised the conduct of warfare during the twentieth century as the development of platforms with the ability to project military power while operating above the earth's surface has opened a third dimension to armed conflict. Technological advances has made man's ascent into the air possible and it has progressively become the most important sphere of modern warfare. Airpower entails the use of the air not just as a medium for transit, as in the case of a projectile, but also for manoeuvre, deployment and surprise which includes aircraft, non-ballistic cruise missiles and more increasingly, space assets. Constrained by geography and the physical environment to a much lesser extent than surface forces, airpower enjoys speed, reach, responsiveness and perspective far exceeding those of land or seapower. Today, aircraft are able to fly unlimited distances and deliver a variety of weapons upon targets with unprecedented destructive capacity. As well as applying direct firepower, aircraft are able to protect and enhance the combat power of all other friendly forces, regardless of their operational spheres. Indeed, the versatility, range, speed, precision and lethality of contemporary airpower have made it such an integral component of modern warfare that no major military operation can be efficiently conducted without it. In many instances, airpower has demonstrated that it can be the dominant form of military power

    Revolution in the Defence Electronics Market? An Economic Analysis of Sectoral Change

    Get PDF
    Within the defence sector there have been marked changes in the nature of the composite industries. This is particularly true of the electronics industry which continues to grow in importance, with electronic components built into nearly every weapons system and piece of equipment. Given the “Revolution in Military Affairs” (RMA) it seems certain that this growth will continue, impacting on both product and process. The result, however, may not be the contestable open market many expect (and hope for) as Network Enabled Warfare may result in new entrants, such as IT specialist and increased competition. Alternatively the nature of the market may continue to benefit the incumbents. This paper presents an analysis of the changes taking place in the industry using firm-level, primary, survey-based, qualitative data on corporate conduct. The results suggest that in practice the incumbents do seem to be in a strong position. The new demands of the customer require much more than mere technical capability. Specialists who do not have established industry relationships, who do not understand industry “protocols” and who cannot communicate effectively with the customer are unlikely to survive. This suggests that rather than new entrants, there may in fact be exits from the industry and further consolidation.

    Hackers as terrorists? Why it doesn't compute

    Get PDF
    The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category eithe

    Distributed situation awareness in dynamic systems: Theoretical development and application of an ergonomics methodology

    Get PDF
    The purpose of this paper is to propose foundations for a theory of situation awareness based on the analysis of interactions between agents (i.e., both human and non-human) in subsystems. This approach may help promote a better understanding of technology-mediated interaction in systems, as well as helping in the formulation of hypotheses and predictions concerning distributed situation awareness. It is proposed that agents within a system each hold their own situation awareness which may be very different from (although compatible with) other agents. It is argued that we should not always hope for, or indeed want, sharing of this awareness, as different system agents have different purposes. This view marks situation awareness as a 1 dynamic and collaborative process that binds agents together on tasks on a moment-by-moment basis. Implications of this viewpoint for development of a new theory of, and accompanying methodology for, distributed situation awareness are offered

    Expanding alliance: ANZUS cooperation and Asia–Pacific security

    Get PDF
    Is an alliance conceived as a bulwark against a resurgence of Japanese militarism and which cut its military and intelligence teeth in the Cold War is still relevant to today’s strategic concerns? Overview The alliance between Australia and the US, underpinned by the formal ANZUS Treaty of 1951, continues to be a central part of Australian defence and security thinking and an instrument of American policy in the Asia–Pacific. How is it that an alliance conceived as a bulwark against a resurgence of Japanese militarism and which cut its military and intelligence teeth in the Cold War is still relevant to today’s strategic concerns? The answer is partly—and importantly—that the core values of the ANZUS members are strongly aligned, and successive Australian governments and American presidential administrations have seen great value in working with like-minded partners to ensure Asia–Pacific security. Far from becoming a historical curiosity, today it’s not just relevant, but of greater importance than has been the case in the past few decades. To explore new ideas on how to strengthen the US–Australia alliance, ASPI conducted a high-level strategic dialogue in Honolulu in July this year. Discussions canvassed the future strategic environment; the forthcoming Australian Defence White Paper; budget, sovereignty and expectation risks; and cooperation in the maritime, land, air, cyber, space and intelligence domains. A key purpose of the Honolulu dialogue was to help ASPI develop policy recommendations on the alliance relationship for government. This report is the product of those discussions
    corecore